A team of researchers at the University of Notre Dame hid pieces of a complex math problem inside the checksum component of TCP/IP packets and sent them out over the Internet to be processed by unsuspecting servers around the world (“parasitic computing”). The team wanted to see if they could cause the Web to act as one giant computer, even though it is actually composed of many smaller ones. Each piece of the problem was solved in the course of the servers performing standard communication over the Internet.

Because the experiment was successful, it raises ethical questions about computers being used without their owners' knowledge to do processing of data they know nothing about.

Experts say that since the process of sending the data out is highly inefficient, there is not a high risk that there will be a practical application of this technology. However, variations of this technique could make online piracy more efficient.

RON'S OPINION
On one hand, I think it is cool that one can use the TCP/IP packet to do such geeky stuff; but it concerns me to think what damage could be done if it got into the wrong hands–or if the researchers made a mistake. I learned the other day that computer worms came about because IBM and Xerox were using them, experimenting with fixing computers remotely. The problem came when one of the worms went haywire and–unfortunately–we had our first virus. That's what this reminds me of.

Based on the information I was able to gather, it looks like these researchers didn't do any harm, but what of other people who do malicious hacking? A technology has to start somewhere, and this I fear could be the start of a new brand of malicious hacking. Anytime a server is compromised to do unauthorized work for someone without the owner knowing about it, it's bad.

Fortunately, though, I think it will take a few years for this technology to be refined and made more efficient.

USER COMMENTS 21 comment(s)

Cool(8:47am EST Fri Aug 31 2001)Wow… you gotta admit that's pretty damn cool. But like most 'cool' computer technologies, it's just a matter of time before someoneuses it to start yet another wave of attacks & paranoia. In the end, we'll undoubtedly see more legislation dealing with this type of acvtivity.

It's too bad. Slowly but surely, the Internet will become buried under reams of government regulations.

Hmmm. . .(9:18am EST Fri Aug 31 2001)Thoughts go through my mind more of the ways this can be abused rather than helpful.

I doubt you could harness the processing power of a good server farm, but if you wanted to process something anonymously you could get some smaller stuff done.

I wonder if you could also send a file out in pieces to multiple servers, and have them deliver it to another server, dropping it off piece by piece to the unsuspecting it would look like normal network traffic.

Matter of fact, aside from those parallel number cruncher projects like Seti, I can't think of much good this would do.

– by Ziwiwiwiwiwiwwiwiwi

..(9:36am EST Fri Aug 31 2001)Wait for MS to release their new software so the parasitic computing can be done more efficiently. – by me

great(10:11am EST Fri Aug 31 2001)just another thing that's going to slow servers down. how many of these tests will it take to slow or crash a server? and can someone assemble a virus in this way. each one making a part, and sending it off… – by —Mike Savad

Cracking(10:17am EST Fri Aug 31 2001)Now I can use everyone's computers to help me crack passwords and get past encryption!– by Robguy )

kids(10:23am EST Fri Aug 31 2001)It's a cool thing but wait until every script kiddys and their mom & pop PC get on the scene. Here's to patch-up paradise – by narf

No need for concern.(10:27am EST Fri Aug 31 2001)Those that have read my posts in the past know me to take a rather cynical and perhaps paranoid line on many present and future technologies. This one however is certainly not a cause for concern.

First of all, this technique is simply using TCP/IP as a rudimentary calculator. From a theoretical stand point this is interesting and very cool but, it is highly inefficient and very impractical for any real application.

While it is true that the technique does “steal” cpu cycles because the processor has to handle the TCP/IP packet, the technique does not have any form of access to the system. There is no compromise or security risk. In fact, this has no more effect on a systems than broadcast packets received by the system.

With broadcasts, the cpu must use a cycle or two to process or look at the packet but nothing more than that. This means that if this technique were implemented in a very large scale it could slow down a system and it would use some of your bandwidth but, it would not present any risk of intrusion.

Although the process uses TCP/IP on remote systems to perform calculations, the actual program and processing is residing on the program owners system, not yours. Furthermore, this technique is *SO* inefficient it is almost completely useless. You could liken this experiment to someone building a bridge out of popcicle sticks. Sure, it could be done and it would be pretty neat. But, using steel girders would be a lot stronger, quicker and more efficient.

Basically, Ping is far more dangerous than parasitic computing could ever hope to be.

– by Get a Grip

XP(2:14pm EST Fri Aug 31 2001)I hear that WinXP is going to have a “remote fix” function built in. That may be a privacy issue too. – by evildead

WinXP is satan(2:42pm EST Fri Aug 31 2001)We will all die. Bill G will take over the world and viruses will spread to every part of the globe burning major cities in their wake. Now Billy G will send virii through our TCP/IP pipes.

I beat you to it, Rax. Why don't start your routine MS bashing. Tell us how all us businesses that run NT are so miserable and how we have to reboot our computer every 4 seconds and if we ran Linux, every problem we ever faced would be solved. Upon running Linux, my acne will be cleared, my cat will learn how to clean her own litterbox, and Blowhole will finally be able to get laid. – by SB

Shields Up(6:59pm EST Fri Aug 31 2001)Correct me if Iím wrong but wont a firewall deny the packets to your system. It is coming from an unknown source so a firewall should block it. – by -=[XF]=-2LT DiRtBaG

It raises ethical questions!!!?(2:44am EST Sat Sep 01 2001)

Strange how the University of Notre Dame was even bold enough to reveal what they did to the servers throughout the world without the owner's permision.

Don't you think that using someone else's property without permision is unethical ( whether or not it was practical.) The University is no doubt depending on us allowing the notion that this is even a legitimate question.

Of Course it is unethical. But hey, let's put that to the test! Let's see if it is ok for us to break into there servers for our mathematical recreations. I bet the intellectual gods might be less 'open minded' about it being done to them without permsion! – by Peter

Surely…(8:32am EST Sat Sep 01 2001)Giving permission to have your computer handle packets is implicit in linking your computer to the net in any way – after all, that's what the net IS… – by Charmaka

Hmm….(4:56pm EST Sat Sep 01 2001)I wonder if there is a Flask add on, so i can convert movies in a few minutes, instead of a few hours….I can dream… – by De@d St0p

Peter .. (6:00pm EST Sat Sep 01 2001)Were talking 1 or 2 cycles of CPU .. I am not a big fan of stealing ( witch I guess in theroy is what it is ). But if in the name of Science and education someone wants to weeeeeze a couple of cycles ( nano seconds or less ) from me . By all means and in the name of science , have at it ! however when you own into my loonix box and start running a warz server on my OC collection. Well that is gonna light my fire ! :)– by -Presto419

The Way(3:02pm EST Wed Sep 05 2001)Why not share computing cycles? How many home users really put their CPU to work with e-mails, surfing the web and playing games. Those “powerful”– really just fast- chips could be put to use doing something beneficial to the community. This is in a way the concept behind open-source computing…a large community of intelligent users helping eachother out. This is much better than feeding one large corporation and being lead around by the nose for upgrades and compatibility.

Computers were designed as task-saving tools not as a way for one corporation to get rich.

If you want to lead go with open-source. If you want to be lead around go with that largest software corporation. – by Open Mind